메뉴 건너뛰기




Volumn , Issue , 2008, Pages 43-52

A formal security policy for Xenon

Author keywords

Circus; CSP; Hypervisor; Information flow security; Open source; Refinement; Z

Indexed keywords

CIRCUS; CSP; HYPERVISOR; INFORMATION-FLOW SECURITY; OPEN-SOURCE; REFINEMENT; Z;

EID: 67649851159     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456396.1456401     Document Type: Conference Paper
Times cited : (12)

References (36)
  • 1
    • 70349234852 scopus 로고    scopus 로고
    • An analysis of the GWV security policy
    • Austin, Texas, US, November
    • J. Alves-Foss and C. Taylor. An analysis of the GWV security policy. In Proc. ACL2 Workshop, Austin, Texas, US, November 2004.
    • (2004) Proc. ACL2 Workshop
    • Alves-Foss, J.1    Taylor, C.2
  • 5
    • 0003400251 scopus 로고    scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • Technical Report ESD-TR-75-306,MTR-2997 rev. 1, MITRE, 1976
    • D. Bell and L. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306,MTR-2997 rev. 1, MITRE, 1976.
    • Bell, D.1    LaPadula, L.2
  • 7
    • 70349239751 scopus 로고    scopus 로고
    • Xen security modules
    • April 2007. Available from
    • G. Coker. Xen security modules. Xen Summit 2007 Presentation, April 2007. Available from http://www.xensource.com/xen/xensummit.html.
    • Xen Summit 2007 Presentation
    • Coker, G.1
  • 8
    • 0003765587 scopus 로고    scopus 로고
    • The Common Criteria Project Sponsoring Organizations, v. 3.1, rev. 1 edition, September, Also referred to as ISO 15408
    • The Common Criteria Project Sponsoring Organizations. Common Criteria for Information Technology Security Evaluation, v. 3.1, rev. 1 edition, September 2006. Also referred to as ISO 15408.
    • (2006) Common Criteria for Information Technology Security Evaluation
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5), May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.1
  • 11
    • 84974776068 scopus 로고
    • A classification of security properties for process algebra
    • R. Focardi and R. Gorrieri. A classification of security properties for process algebra. J. Computer Security, 3(1):5-33, 1994.
    • (1994) J. Computer Security , vol.3 , Issue.1 , pp. 5-33
    • Focardi, R.1    Gorrieri, R.2
  • 12
    • 70349247222 scopus 로고    scopus 로고
    • Formal modelling of a separation kernel hypervisor
    • Technical Report 13, University of York, May
    • L. Freitas and J. McDermott. Formal modelling of a separation kernel hypervisor. Technical Report 13, University of York, May 2008.
    • (2008)
    • Freitas, L.1    McDermott, J.2
  • 13
    • 70349236399 scopus 로고    scopus 로고
    • Circus based development environment
    • Technical Report 12, University of York, Sep
    • L. Freitas and J. Woodcock. Circus based development environment. Technical Report 12, University of York, Sep 2007.
    • (2007)
    • Freitas, L.1    Woodcock, J.2
  • 14
  • 16
    • 84885586195 scopus 로고    scopus 로고
    • A separation kernel formal security policy
    • Boulder, Colorado, US, July
    • D. Greeve, M. Wilding, and W. M. Vanfleet. A separation kernel formal security policy. In Proc. ACL2 Workshop, Boulder, Colorado, US, July 2003.
    • (2003) Proc. ACL2 Workshop
    • Greeve, D.1    Wilding, M.2    Vanfleet, W.M.3
  • 19
    • 19044364805 scopus 로고    scopus 로고
    • Information Technology-Z Formal Specification Notation-Syntax, Type System and Semantics. ISO/IEC, first edition,
    • ISO/IEC 13568
    • ISO/IEC 13568. Information Technology-Z Formal Specification Notation-Syntax, Type System and Semantics. ISO/IEC, first edition, 2002.
    • (2002)
  • 22
    • 31844452867 scopus 로고    scopus 로고
    • The framework of selective interleaving functions and the modular assembly kit
    • Fairfax, Virginia, US, November
    • H. Mantel. The framework of selective interleaving functions and the modular assembly kit. In Proc. Formal Methods in Security Engineering, Fairfax, Virginia, US, November 2005.
    • (2005) Proc. Formal Methods in Security Engineering
    • Mantel, H.1
  • 24
    • 84974747891 scopus 로고
    • Proving noninterference and functional correctness using traces
    • J. McLean. Proving noninterference and functional correctness using traces. J. Computer Security, 1(1), 1992.
    • (1992) J. Computer Security , vol.1 , Issue.1
    • McLean, J.1
  • 25
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • Oakland, California, US, May
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symposium on Research in Security and Privacy, Oakland, California, US, May 1994.
    • (1994) Proc. IEEE Symposium on Research in Security and Privacy
    • McLean, J.1
  • 26
    • 48649091670 scopus 로고    scopus 로고
    • B. Randell and J. Rushby. Distributed secure systems: Then and now. In 23st Annual Computer Security Applications Conference (ACSAC), Miami, FL, US, December 2007.
    • B. Randell and J. Rushby. Distributed secure systems: Then and now. In 23st Annual Computer Security Applications Conference (ACSAC), Miami, FL, US, December 2007.
  • 27
    • 0029232082 scopus 로고
    • CSP and determinism in security modelling
    • Oakland, California, US, May
    • A. Roscoe. CSP and determinism in security modelling. In Proc. IEEE Symposium on Security and Privacy, Oakland, California, US, May 1995.
    • (1995) Proc. IEEE Symposium on Security and Privacy
    • Roscoe, A.1
  • 29
    • 0001868056 scopus 로고
    • Non-interference through nondeterminism
    • Brighton, UK, November
    • A. Roscoe, J. Woodcock, and L. Wulf. Non-interference through nondeterminism. In Proc. ESORICS, Brighton, UK, November 1994.
    • (1994) Proc. ESORICS
    • Roscoe, A.1    Woodcock, J.2    Wulf, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.